Search Results - (( _ application server algorithm ) OR ( mobile application a algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- application a »
- a algorithm »
-
1
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
2
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
3
-
4
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
5
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
6
Objects tracking from natural features in mobile augmented reality
Published 2013“…The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
Published 2016“…Mobile Cloud Computing (MCC) enables the resource-constrained mobile devices to execute the compute-intensive mobile applications either in client/server model or through cyber foraging of the tasks to the cloud servers. …”
Get full text
Get full text
Thesis -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…Cloud computing is currently emerging quickly as a client-server technology structure and, currently, providing distributed service applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
16
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010Get full text
Get full text
Citation Index Journal -
17
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
18
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
19
Automated multi-factor analytics for cheat-proofing attendance-taking
Published 2018“…A potential application of smartphone is as a tool to prevent attendance cheating. …”
Get full text
Get full text
Article -
20
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing
Published 2023Conference Paper
